Data collection for attack detection and security measurement in mobile ad hoc networks: A survey

G Liu, Z Yan, W Pedrycz - Journal of Network and Computer Applications, 2018 - Elsevier
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …

A survey of attacks and countermeasures in mobile ad hoc networks

B Wu, J Chen, J Wu, M Cardei - Wireless network security, 2007 - Springer
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …

Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols

YW Law, M Palaniswami, LV Hoesel… - ACM Transactions on …, 2009 - dl.acm.org
A typical wireless sensor node has little protection against radio jamming. The situation
becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the …

A context‐aware internet of things‐driven security scheme for smart homes

P Khanpara, K Lavingia, R Trivedi, S Tanwar… - Security and …, 2023 - Wiley Online Library
In recent years, the Internet of Things (IoT) has become very popular as it has numerous
applications in the industrial and research domain. Moreover, the features of IoT systems …

Comprehensive review on distributed denial of service attacks in wireless sensor networks

S Subramani, M Selvi - International Journal of Information …, 2023 - inderscienceonline.com
Distributed denial of service (DDoS) is the most popular disruptive type of attack in wireless
sensor networks (WSNs). It is extremely harmful for the functioning of the network, since it …

The sleep deprivation attack in sensor networks: Analysis and methods of defense

M Pirretti, S Zhu, N Vijaykrishnan… - International …, 2006 - journals.sagepub.com
The ability of sensor nodes to enter a low power sleep mode is very useful for extending
network longevity. We show how adversary nodes can exploit clustering algorithms to …

GDVAN: a new greedy behavior attack detection algorithm for VANETs

MN Mejri, J Ben-Othman - IEEE Transactions on Mobile …, 2016 - ieeexplore.ieee.org
Vehicular Ad hoc Networks (VANETs), whose main objective is to provide road safety and
enhance the driving conditions, are exposed to several kinds of attacks such as Denial of …

Attacks and countermeasures in sensor networks: a survey

K **ng, SSR Srinivasan, MJM Rivera, J Li, X Cheng - Network security, 2010 - Springer
A wireless sensor network (WSN) comprises a large number of sensors that collaboratively
monitor various environments. The sensors all together provide global views of the …

A framework for MAC protocol misbehavior detection in wireless networks

S Radosavac, JS Baras, I Koutsopoulos - … of the 4th ACM workshop on …, 2005 - dl.acm.org
The pervasiveness of wireless devices and the architectural organization of wireless
networks in distributed communities, where no notion of trust can be assumed, are the main …

Security issues in flying ad-hoc networks (FANETS)

İ Bekmezci, E Şentürk, T Türker - Journal of Aeronautics and …, 2016 - jast.hho.msu.edu.tr
Abstract Technological advancements in Unmanned Aerial Vehicles (UAV) encourage the
use of multi-UAV systems in military and civil applications. The most important benefit of the …